Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News

      Beijing’s chip champions blacklisted by Taiwan

      16 June 2025

      The little-known company disrupting Eskom’s monopoly

      16 June 2025

      Chief sub-editor wanted – help shape South African tech media

      16 June 2025

      Public money, private plans: MPs demand Post Office transparency

      13 June 2025

      Coal to cash: South Africa gets major boost for energy shift

      13 June 2025
    • World

      Yahoo tries to make its mail service relevant again

      13 June 2025

      Qualcomm shows off new chip for AI smart glasses

      11 June 2025

      Trump tariffs to dim 2025 smartphone shipments

      4 June 2025

      Shrimp Jesus and the AI ad invasion

      4 June 2025

      Apple slams EU rules as ‘flawed and costly’ in major legal pushback

      2 June 2025
    • In-depth

      Grok promised bias-free chat. Then came the edits

      2 June 2025

      Digital fortress: We go inside JB5, Teraco’s giant new AI-ready data centre

      30 May 2025

      Sam Altman and Jony Ive’s big bet to out-Apple Apple

      22 May 2025

      South Africa unveils big state digital reform programme

      12 May 2025

      Is this the end of Google Search as we know it?

      12 May 2025
    • TCS

      TechCentral Nexus S0E1: Starlink, BEE and a new leader at Vodacom

      8 June 2025

      TCS+ | The future of mobile money, with MTN’s Kagiso Mothibi

      6 June 2025

      TCS+ | AI is more than hype: Workday execs unpack real human impact

      4 June 2025

      TCS | Sentiv, and the story behind the buyout of Altron Nexus

      3 June 2025

      TCS | Signal restored: Unpacking the Blue Label and Cell C turnaround

      28 May 2025
    • Opinion

      Beyond the box: why IT distribution depends on real partnerships

      2 June 2025

      South Africa’s next crisis? Being offline in an AI-driven world

      2 June 2025

      Digital giants boost South African news media – and get blamed for it

      29 May 2025

      Solar panic? The truth about SSEG, fines and municipal rules

      14 April 2025

      Data protection must be crypto industry’s top priority

      9 April 2025
    • Company Hubs
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • AvertITD
      • Braintree
      • CallMiner
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • Incredible Business
      • iONLINE
      • Iris Network Systems
      • LSD Open
      • NEC XON
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Tenable
      • Vertiv
      • Videri Digital
      • Wipro
      • Workday
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Fintech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Public sector
      • Retail and e-commerce
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Banking » The little-known secret behind every credit card number

    The little-known secret behind every credit card number

    Luhn’s algorithm is a simple checksum that roots out human error in card number inputs. Here’s how it works.
    By Nkosinathi Ndlovu10 September 2024
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    The little-known secret behind every credit card numberThe threat of fraudulent credit card numbers from malicious actors is not the only problem that financial institutions and payments services have to grapple with when processing card transactions. Another more common issue is human error.

    Luhn’s algorithm, developed by IBM scientist Hans Peter Luhn in 1954, was designed to help verify that a credit or debit card number is valid – and you can test it with your own bank cards.

    Luhn’s algorithm works by doubling the first number and then every second digit in the card number. If the product is greater than nine, then each digit in the product is added together in the next step.

    After that, all the digits from left to right are added together. If the result is a multiple of 10, the credit card number is valid. If not, it is invalid.

    Luhn’s algorithm is part of the checksum family of algorithms. These algorithms ingest large amounts of data and create a value representing that data. They are often provided prior to data being transferred and used to check its validity after it has been transported from one place to another, ensuring that no parts were lost, changed or added to the data in transit.

    The Luhn algorithm

    Created by IBM scientist Hans Peter Luhn, it is widely used by most credit cards and many government identification numbers as a simple method of distinguishing valid numbers from mistyped or otherwise incorrect numbers. pic.twitter.com/74Buk6jhyI

    — Massimo (@Rainmaker1973) September 7, 2024

    Luhn was born in Germany in 1896 and studied engineering at the Technical University in Munich, although he left the institution without obtaining a degree. He moved to the US in the 1920s to work as a textile engineer and thereafter moved into the field of information science, joining IBM in 1941.

    Patents

    Among his other contributions to information science are more than 80 patents relating to information retrieval, text analysis and data processing. He was also involved in the development of the earliest machine translation methods using statistical techniques, forerunners to the methods used in machine learning and natural language processing today.  – © 2024 NewsCentral Media

    Don’t miss:

    First quantum cyberattack expected by 2030s – IBM



    Hans Peter Luhn IBM The little-known secret behind every credit card number
    Subscribe to TechCentral Subscribe to TechCentral
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleTop-paying IT jobs in South Africa for 2025
    Next Article Lessons from CrowdStrike, two months after disaster struck

    Related Posts

    IBM sets sights on practical quantum computing by 2029

    11 June 2025

    Silicon slip-ups: the tech industry’s biggest flops

    29 May 2025

    Scaling enterprise productivity with AI – a must-attend event for business leaders

    21 May 2025
    Company News

    Huawei Watch Fit 4 Series: smarter sensors, sharper design, stronger performance

    13 June 2025

    Change Logic and BankservAfrica set new benchmark with PayShap roll-out

    13 June 2025

    SAPHILA 2025 – transcending with purpose, connection and AI-powered vision

    13 June 2025
    Opinion

    Beyond the box: why IT distribution depends on real partnerships

    2 June 2025

    South Africa’s next crisis? Being offline in an AI-driven world

    2 June 2025

    Digital giants boost South African news media – and get blamed for it

    29 May 2025

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    © 2009 - 2025 NewsCentral Media

    Type above and press Enter to search. Press Esc to cancel.